Vous êtes sur la page 1sur 9

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/326408524

Handwritten Digit Recognition using Machine Learning Algorithms

Article · March 2018


DOI: 10.17509/ijost.v3i1.10795

CITATIONS READS

2 3,226

5 authors, including:

S. M. Shamim Md Badrul Alam Miah


Bangladesh Army University of Engineering & Technology Mawlana Bhashani Science and Technology University
12 PUBLICATIONS   6 CITATIONS    45 PUBLICATIONS   86 CITATIONS   

SEE PROFILE SEE PROFILE

Angona Sarker
Mawlana Bhashani Science and Technology University
12 PUBLICATIONS   37 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Improvement of Data Transmission Speed and Fault Tolerance over Software Defined Networking View project

Image Processing and Neural Network View project

All content following this page was uploaded by S. M. Shamim on 15 July 2018.

The user has requested enhancement of the downloaded file.


Global Journal of Computer Science and Technology: D
Neural & Artificial Intelligence
Volume 18 Issue 1 Version 1.0 Year 2018
Type: Double Blind Peer Reviewed International Research Journal
Publisher: Global Journals
Online ISSN: 0975-4172 & Print ISSN: 0975-4350

Handwritten Digit Recognition using Machine Learning Algorithms


By S M Shamim, Mohammad Badrul Alam Miah, Angona Sarker, Masud Rana
& Abdullah Al Jobair
Mawlana Bhashani Science and Technology University
Abstract- Handwritten character recognition is one of the practically important issues in pattern
recognition applications. The applications of digit recognition includes in postal mail sorting,
bank check processing, form data entry, etc. The heart of the problem lies within the ability to
develop an efficient algorithm that can recognize hand written digits and which is submitted by
users by the way of a scanner, tablet, and other digital devices. This paper presents an approach
to off-line handwritten digit recognition based on different machine learning technique. The main
objective of this paper is to ensure effective and reliable approaches for recognition of
handwritten digits. Several machines learning algorithm namely, Multilayer Perceptron, Support
Vector Machine, Naïve Bayes, Bayes Net, Random Forest, J48 and Random Tree has been used
for the recognition of digits using WEKA.
Keywords: pattern recognition, handwritten recognition, digit recognition, machine learning, WEKA,
off-line handwritten recognition, machine learning algorithm, neural network, classification
algorithm.
GJCST-D Classification: I.7.5, I.2.7, I.5.m

HandwrittenDigitRecognitionusingMachineLearningAlgorithms

Strictly as per the compliance and regulations of:

© 2018. S M Shamim, Mohammad Badrul Alam Miah, Angona Sarker, Masud Rana & Abdullah Al Jobair. This is a
research/review paper, distributed under the terms of the Creative Commons Attribution-Noncommercial 3.0 Unported License
http://creativecommons.org/licenses/by-nc/3.0/), permitting all non-commercial use, distribution, and reproduction in any
medium, provided the original work is properly cited.
Handwritten Digit Recognition using Machine
Learning Algorithms
S M Shamim α, Mohammad Badrul Alam Miah σ, Angona Sarker ρ, Masud Rana Ѡ & Abdullah Al Jobair ¥

Abstract- Handwritten character recognition is one of the with individuals. One of the challenges in handwritten
practically important issues in pattern recognition applications. characters recognition wholly lies in the variation and
The applications of digit recognition includes in postal mail distortion of handwritten character set because distinct
sorting, bank check processing, form data entry, etc. The heart

Year 2018
community may use diverse style of handwriting, and
of the problem lies within the ability to develop an efficient
algorithm that can recognize hand written digits and which is
control to draw the similar pattern of the characters of
submitted by users by the way of a scanner, tablet, and other their recognized script.
digital devices. This paper presents an approach to off-line Identification of digit from where best
17
handwritten digit recognition based on different machine discriminating features can be extracted is one of the
learning technique. The main objective of this paper is to major tasks in the area of digit recognition system. To

Global Journal of Computer Science and Technology ( D ) Volume XVIII Issue I Version I
ensure effective and reliable approaches for recognition of locate such regions different kind of region sampling
handwritten digits. Several machines learning algorithm techniques are used in pattern recognition [4].The
namely, Multilayer Perceptron, Support Vector Machine, Naïve challenge in handwritten character recognition is mainly
Bayes, Bayes Net, Random Forest, J48 and Random Tree has
caused by the large variation of individual writing styles
been used for the recognition of digits using WEKA. The result
of this paper shows that highest 90.37% accuracy has been
[5]. Hence, robust feature extraction is very important to
obtained for Multilayer Perceptron. improve the performance of a handwritten character
Keywords: pattern recognition, handwritten recognition, recognition system. Nowadays handwritten digit
digit recognition, machine learning, WEKA, off-line recognition has obtained lot of concentration in the area
handwritten recognition, machine learning algorithm, of pattern recognition system sowing to its application in
neural network, classification algorithm. diverse fields. In next days, character recognition
system might serve as a cornerstone to initiate
I. Introduction paperless surroundings by digitizing and processing

I
existing paper documents.
ntelligent image analysis is an appealing research
Handwritten digit dataset are vague in nature
area in Artificial Intelligence and also crucial for a
because there may not always be sharp and perfectly
variety of present open research difficulties.
straight lines. The main goal in digit recognition is
Handwritten digits recognition is a well-researched
feature extraction is to remove the redundancy from the
subarea within the field that is concerned with learning
data and gain a more effective embodiment of the word
models to distinguish pre-segmented handwritten digits.
image through a set of numerical attributes. It deals with
It is one of the most important issues in data mining,
extracting most of the essential information from image
machine learning, pattern recognition along with many
raw data [6]. In addition the curves are not necessarily
other disciplines of artificial intelligence [1].The main
smooth like the printed characters. Furthermore,
application of machine learning methods over the last
characters dataset can be drawn in different sizes and
decade has determined efficacious in conforming
the orientation which are always supposed to be written
decisive systems which are competing to human
on a guideline in an upright or downright point.
performance and which accomplish far improved than
Accordingly, an efficient handwritten recognition system
manually written classical artificial intelligence systems
can be developed by considering these limitations. It is
used in the beginnings of optical character recognition
quiet exhausting that sometimes to identify hand written
technology [2]. However, not all features of those
characters as it can be seen that most of the human
specific models have been previously inspected.
beings can’t even recognize their own written scripts.
A great attempt of research worker in machine
Hence, there exists constraint for a writer to write
learning and data mining has been contrived to achieve
apparently for recognition of handwritten documents.
efficient approaches for approximation of recognition
Before revealing the method used in conducting
from data [3]. In twenty first Century handwritten digit
this research, software engineering module is first
communication has its own standard and most of the
presented. Pattern recognition along with Image
times in daily life are being used as means of
processing plays compelling role in the area of
conversation and recording the information to be shared
handwritten character recognition. The study [7],
Author α σ ρ Ѡ ¥: Department of Information and Communication describes numerous types of classification of feature
Technology, Mawlana Bhashani Science and Technology University, extraction techniques like structural feature based
Santosh, Tangail-1902. e-mail: ictshamim@yahoo.com
© 2018 Global Journals
Handwritten Digit Recognition using Machine Learning Algorithms

methods, statistical feature based methods and global anticipated to reside to a category based on which side
transformation techniques. Statistical approaches are of the gap they fall on [15]. The optimum algorithm is
established on planning of how data are selected. It developed through a “training” phase in which training
utilizes the information of the statistical distribution of data are adopted to develop an algorithm capable to
pixels in the image. The paper [8], provided SVM based discriminate between groups earlier defined by the
offline handwritten digit recognition system. Authors operator (e.g. patients vs. controls), and the “testing”
claim that SVM outperforms in the experiment. phase in which the algorithm is adopted to blind-predict
Experiment is carried out on NIST SD19 standard the group to which a new perception belongs [16]. It
dataset. The study [9] provide the conversion of also provides a very accurate classification performance
handwritten data into electronic data, nature of over the training records and produces enough search
handwritten characters and the neural network approach space for the accurate classification of future data
to form machine competent of recognizing hand written parameters. Hence it always ensures a series of
Year 2018

characters. The study [10] addresses a comprehensive parameter combinations no less than on a sensible
criterion of handwritten digit recognition with various subset of the data. In SVM it’s better to scale the data
state of the art approaches, feature representations, and always; because it will extremely improve the results.
18 datasets. However, the relationship of training set size Therefore be cautious with big dataset, as it may leads
versus accuracy/error and the dataset-independence of to the increase in the training time.
Global Journal of Computer Science and Technology ( D ) Volume XVIII Issue I Version I

the trained models are analyzed. The paper [11]


c) J48
presents convolution neural networks into the
handwritten digit recognition research and describes a The J48 algorithm is developed for the MONK
system which can still be considered state of the art. project along with WEKA [17]. The algorithm is an
extension for C4.5 decision tree algorithm [18]. There
II. Methods and Materials are many options for tree pruning in case of J48
algorithm. The classification algorithms convenient in
a) Multilayer Perceptions WEKA try to clarify the results or prune. This method will
A neural network based classifier, called Multi- help us to produces more generic results and also can
Layer perception (MLP), is used to classify the be used to correct potential over fitting issues. J48 helps
handwritten digits. Multilayer perceptron consists of to recursively classify until each of the leaf is pruned,
three different layers, input layer, hidden layer and that is to classify as close knit to the data. Hence this will
output layer. Each of the layers can have certain number helps to ensure the accuracy, although excessive rules
of nodes also called neurons and each node in a layer is will be produced. However pruning will cause to less
connected to all other nodes to the next layer [12]. For accuracy of a model on training data. This is due to
this reason it is also known as feed forward network. The pruning employs various means to relax the specificity
number of nodes in the input layer depends upon the of the decision tree, hopefully improving its performance
number of attributes present in the dataset. The number on the test data. The complete concept is to
of nodes in the output layer relies on the number of increasingly generalize a decision tree until it gains a
apparent classes exist in the dataset. The convenient balance of accuracy together with flexibility. The J48
number of hidden layers or the convenient number of applies two pruning methods. First one is known as
nodes in a hidden layer for a specific problem is hard to subtree replacement. This concludes that nodes in the
determine. But in general, these numbers are selected decision tree can be replaced with a leaf -- which
experimentally. In multilayer perceptron, the connection reduces the number of tests along a particular path. This
between two nodes consists of a weight. During training process begins from the leaves of the completely
process, it basically learns the accurate weight formed tree, and attempts backwards toward the root.
adjustment which is corresponds to each connection Second category of pruning adopted in J48 is termed
[13]. For the learning purpose, it uses a supervised subtree rising. In this respect, a node can be moved
learning technique named as Back propagation upwards towards the root of the tree, replacing other
algorithm. nodes another way. Subtree rising repeatedly has a
insignificant effect on decision tree models. There is
b) Support Vector Machine generally no clear way to anticipate the utility of the
SVM or Support Vector Machine is a specific option, though it may be desirable to try turning it off if
type of supervised ML method that intents to classify the the induction process is catching a long time. This is
data points by maximizing the margin among classes in because of the fact that subtree rising may be
a high-dimensional space [14]. SVM is a representation somewhat computationally complicated. Error rates are
of examples as points in space, mapped due to the needed to make actual conclusions about which parts
examples of the separate classes are divided by a fair of the tree to rise or replace. There exist multiple ways to
gap that is as extensive as possible. After that new perform this. The straight forward way is to reserve a
examples are mapped into that same space and portion of the training data in order to test on decision

© 2018
1 Global Journals
Handwritten Digit Recognition using Machine Learning Algorithms

tree. Reserved portion may then be adopted as test interest. When used in conjunction with statistical
data for the decision tree, aiding to reduce potential over techniques, the graphical model has several advantages
fitting. This method is recognized as reduced-error for data analysis. One, because the model encodes
pruning. Though the approach is straightforward, it also dependencies among all variables, it readily handles
decreases the overall volume of data available for situations where some data entries are missing. Two, a
training the model. For specifically small datasets, it may Bayesian network can be used to learn causal
be advisable to avert using reduced error pruning. relationships, and hence can be used to gain
understanding about a problem domain and to predict
d) Random Forest Algorithm
the consequences of intervention. This classifier learns
Random forest as is an ensemble of un-pruned from training data the conditional probability of each
regression or classification trees, activated from attribute given the class label [22, 23].
bootstrap samples of the training data, adopting

Year 2018
random feature selection in the tree imitation process. g) Random Tree
The prediction is made by accumulating the predictions The algorithm may deal with both regression
of the ensemble by superiority voting for classification. It and classification problems. Random trees is a
returns generalization error rate and is more potent to ensemble of tree predictors which is called forest .The 19
noise. Still, similar to most classifiers, RF may also suffer classification performs as follows: random trees
from the curse of learning from an intensely imbalanced classifier takes the input feature vector, categories it with

Global Journal of Computer Science and Technology ( D ) Volume XVIII Issue I Version I
training data set. Since it is constructed to mitigate the individual tree in the forest, outputs the class label which
overall error rate, it will tend to focus more on the received the most of “votes”. In the event of a
prediction efficiency of the majority class, which regression, the classifier response is the average of the
repeatedly results in poor accuracy for the minority responses over all the trees in the forest [24]. In random
class. tree algorithm all the trees are trained with the same
e) Naive Bayes parameters but on different training sets. These sets are
created from the original training set adopting the
The Naive Bayes classifier [19] contributes a
bootstrap procedure and for each training set, randomly
simple method, representing and learning probabilistic
choose the same number of vectors as in the initial set.
knowledge with clear semantics. It is termed naive due
The vectors are chosen with replacement. That is, some
to it relies on two important simplifying assumes that
vectors will occur more than once and some will be
predictive attributes are conditionally self-reliant given
absent. In random trees there is no need for any
the class, and it considers that no hidden attributes
accuracy estimation techniques, like cross-validation or
influence the prediction method. It is a probabilistic
bootstrap, or a separate test set to obtain an estimate of
classifier which relies upon Bayes theorem with robust
the training error. The error is estimated internally during
and naive independence assumptions. It is one of the
the training.
best basic text classification approaches with numerous
applications in personal email sorting, email spam h) Dataset Description
detection, sexually explicit content detection, document The handwritten digit recognition is a extensive
categorization, sentiment detection, language detection research topic which gives a comprehensive survey of
[20]. Although the naïve design and oversimplified the area including major feature sets, learning datasets,
assumptions that this approach uses, Naive Bayes and algorithms [25]. Contrary to optical character
accomplishes well in many complicated real-world recognition which focuses on recognition of machine-
problems. All though it is often out performed by other printed output, where special fonts can be used and the
approaches such as boosted trees, Max Entropy, variability between characters along with the same size,
Support Vector Machines, random forests etc, Naive font, and font attributes is fairly small.
Bayes classifier is very potent as it is less
The feature extraction and the classification
computationally intensive (in both memory and CPU)
technique play an important role in offline character
and it needs a small extent of training data. Moreover,
recognition system performance. Various feature
the training time with Naive Bayes is considerably
extraction approaches have been proposed for
smaller as opposed to alternative approaches.
character recognition system [26]. The problems faced
f) Bayes Net in handwritten numeral recognition has been studied
Bayesian networks are a powerful probabilistic while using the techniques like Dynamic programming,
representation, and their use for classification has HMM, neural network, Knowledge system and
received considerable attention [21]. It reflects the combinations of above techniques [27]. Wider ranging
states of some part of a world that is being modeled work has been carried out for digit recognition in so
and it describes how those states are related by many languages like English, Chinese, Japanese, and
probabilities. Bayesian network is a graphical model that Arabic. In Indian mainly worked in Devanagari, Tamil,
encodes probabilistic relationships among variables of Telugu and Bengali numeral recognition [28].

© 2018 Global Journals


Handwritten Digit Recognition using Machine Learning Algorithms

In our experiment we used digit dataset tree algorithms are used. We use the same experiment
provided by Austrian Research Institute for Artificial procedure as suggested by WEKA.
Intelligence, Austria. This data set indicate that arbitrary In WEKA, all dataset is considered as instances
scaling and a blur setting of 2.5 for the Mitchell down- and features in the data are also known as attributes.
sampling filter should perform well and used down- The experiment results are partitioned into several sub
sample to 16x16 pixels. division for easier analysis and evaluation. In the first
part, correctly and incorrectly classified instances will be
divided in numeric and percentage value and
subsequently Kappa statistic, mean absolute error and
root mean squared error will be in numeric value.
Experiment shows the relative absolute error and root
relative squared error in percentage (%) for references
Year 2018

and in evaluation process. Our simulation results are


shown in below tables-1 and tables-2. In table-1 mainly
summarizes the result based on accuracy and time
20 taken for each simulation in our experiment. Moreover,
table-2 shows the result based on error during the
Global Journal of Computer Science and Technology ( D ) Volume XVIII Issue I Version I

simulation in WEKA.
Figure 1: A small portion of handwritten dataset example
This dataset is divided in two parts training set
and testing set. Training set has 1893 samples and test
set has 1796 samples. The detail of the dataset is
provided in [29].

III. Experimental Tools


Waikato Environment for Knowledge Analysis
(WEKA) is a prominent suite of machine learning which
is written in Java and developed at the University of
Waikato. It is free software accessible under the GNU
General Public License. It contains a collection of
algorithms and visualization tools for predictive
modelling, data analysis, along with graphical user
interfaces for smooth access to this functionality [30]. It
supports various standard data mining tasks, more
particularly, data pre-processing, classification,
visualization, clustering, feature selection, regression.
All of Weka's approaches are predicated on the
assumption that the data is convenient as a single flat
file or relation, where each data point is characterized
through a fixed number of attributes [31].
WEKA has numerous user interfaces. Its main
user interface is the Explorer, however essentially the
same functionality can be accessed by the component-
based Knowledge Flow interface and from the
command line. The Experimenter allows the systematic
comparison of the predictive performance of the Weka's
machine learning algorithms on an accumulation of
datasets.

IV. Experimental Result and Discussion

WEKA has several graphical user interfaces that


enable easy access to the underlying functionality. To
gauge and investigate the performance on the selected
methods or algorithms namely Support Vector Machine,
Multilayer Perceptron, Random Forest Algorithm,
Random Tree, Naïve Bayes, Bayes Net and j48 Decision

© 2018
1 Global Journals
Handwritten Digit Recognition using Machine Learning Algorithms

Table 1: Simulation result based on accuracy and time consumption

Correctly Incorrectly
Time
Classified Classified Kappa
Name of Algorithms Taken
Instances Instances Statistic
(seconds)
% (value) % (Value)
Multilayer Perceptron 90.37 9.63 3.15 0.893
Support Vector
87.97 12.03 0.56 0.8664
Machine
Random Forest 85.75 14.25 0.44 0.8416

Year 2018
Bayes Net 84.35 15.65 0.86 0.8262
Naïve Bayes 81.85 18.15 3.45 0.7983
J48 79.51 20.49 0.53 0.7722 21
Random Tree 85.6 24.94 0.55 0.7228

Global Journal of Computer Science and Technology ( D ) Volume XVIII Issue I Version I
Table 2: Simulation result based on different error

Mean Relative
Root Mean Root Relative
Name of Algorithms Absolute Absolute
Squared Error Squared Error (%)
Error Error (%)

Multilayer Perceptron 0.023 0.1231 12.78 41.04

Support Vector 0.1611 0.2734 89.49 91.15


Machine

Random Forest 0.0593 0.1532 32.97 51.06

Bayes Net 0.0312 0.1745 17.36 58.15

Naïve Bayes 0.0361 0.1879 20.06 62.65

J48 0.0444 0.1957 24.66 65.25

Random Tree 0.0499 0.2234 27.72 74.45

Based on the above table-1, the highest of overall error made by classification algorithm and
accuracy is 90.37 % and the lowest is 75.06%. The other least the error will be best classifier. In the table-2
algorithm yields an average accuracy of around 83.89%. Multilayer Perceptron has least 0.023 mean absolute
In fact, the highest accuracy belongs to the Multilayer errors among all seven algorithms.
Perceptron classifier, followed by Support Vector In [32] experimental results reveal that it is
Machine with a percentage of 87.97% and subsequently possible to train a face detector without having to label
Random Forest Algorithm 85.75%, Bayes Net 84.35%, images as containing a face or not. Their experiment is
Naïve Bayes 81.85%, j48 79.51% and Random Tree only sensitive to high-level concepts such as cat faces
75.06%. Kappa statistics value ranges from 0 to 1. Value and human bodies. Multi-column deep neural networks
0 means totally disagreement and 1 means full for image classification have been presented in [33].
agreement. It checks the reliability of Classifying They only improve the state-of-the-art on a plethora of
algorithm on dataset. The total time, mean absolute common image classification benchmarks. Supervised
error, root mean absolute error, relative absolute error learning unsupervised learning, reinforcement learning &
and root relative absolute error is also a crucial evolutionary computation, and indirect search for short
parameter to build the model in comparing the different programs encoding deep and large networks has been
classification algorithm. Mean absolute error is the mean presented in [34]. They only proposed how different

© 2018 Global Journals


Handwritten Digit Recognition using Machine Learning Algorithms

technique can be used for pattern recognition. In [35] Advanced Technology & Engineering
recognition of handwritten bangla basic characters and Research, 2(4), 215-219, 2012.
digits using convex hull based feature set has been 8. Neves, R. F., Alberto Filho, N. G., Mello, C. A., &
proposed. Their experiment result shows that with a Zanchettin, C. A SVM based off-line handwritten
database of 10000 samples, the maximum recognition digit recognizer. In System, IEEE International
rate of 76.86% is observed for handwritten Bangla Conference on Man, and Cybernetics (SMC) (pp.
characters. Online and offline handwritten Chinese 510-515), 2011.
character recognition has been proposed in [36]. Their 9. Perwej, Y., & Chaturvedi, A. Machine recognition of
experiment result reported that the highest test hand written characters using neural networks. arXiv
accuracies 89.55% for offline. In our experiment different preprint arXiv:1205.3964, 2012.
machine learning algorithm has been used for handwrite 10. Liu, C. L., Nakashima, K., Sako, H., & Fujisawa, H.
digit recognition and obtained highest 90.37% accuracy Handwritten digit recognition: benchmarking of
Year 2018

obtained for Multilayer Perceptron. state-of-the-art techniques. Pattern Recognition,


36(10), 2271-2285.
V. Conclusion 11. LeCun, Y., Bottou, L., Bengio, Y., & Haffner, P.
22 (1998). Gradient-based learning applied to
The main objective of this investigation is to find
document recognition. Proceedings of the
a representation of isolated handwritten digits that allow
Global Journal of Computer Science and Technology ( D ) Volume XVIII Issue I Version I

IEEE, 86(11), 2278-2324.


their effective recognition. In this paper used different
12. Bhowmik, S., Roushan, M. G., Sarkar, R., Nasipuri,
machine learning algorithm for recognition of
M., Polley, S., & Malakar, S. Handwritten Bangla
handwritten numerals. In any recognition process, the
Word Recognition Using HOG Descriptor. In 2014
important problem is to address the feature extraction
Fourth International Conference of Emerging
and correct classification approaches. The proposed
Applications of Information Technology (EAIT), (pp.
algorithm tries to address both the factors and well in
193-197). IEEE, 2014.
terms of accuracy and time complexity. The overall
13. Kruse, R., Borgelt, C., Klawonn, F., Moewes, C.,
highest accuracy 90.37% is achieved in the recognition
Steinbrecher, M., & Held, P. Multi-Layer
process by Multilayer Perceptron. This work is carried
Perceptrons. In Computational Intelligence (pp. 47-
out as an initial attempt, and the aim of the paper is to
81). Springer London, 2013.
facilitate for recognition of handwritten numeral without
14. Pereira, F., Mitchell, T., & Botvinick, M. Machine
using any standard classification techniques.
learning classifiers and fMRI: a tutorial overview.
References Références Referencias Neuroimage, 45(1), S199-S209, 2009.
15. Support Vector Machine, Online: https://en.
1. Watada, J., & Pedrycz, W. A fuzzy regression wikipedia.org/wiki/Support_vector_machine,
approach to acquisition of linguistic rules. Accessed, August 2015.
Handbook of Granular Computing, 719-732, 2008. 16. Orrù, G., Pettersson-Yeo, W., Marquand, A. F.,
2. Seewald, A. K. (2011). On the brittleness of Sartori, G., & Mechelli, A. Using support vector
handwritten digit recognition models. ISRN Machine machine to identify imaging biomarkers of
Vision, 2012. neurological and psychiatric disease: a critical
3. Kloesgen, W., & Zytkow, J. Handbook of Knowledge review. Neuroscience & Biobehavioral Reviews,
Discovery and Data Mining. 36(4), 1140-1152, 2012.
4. Das, N., Sarkar, R., Basu, S., Kundu, M., Nasipuri, 17. Cooper, G. F., & Herskovits, E. A Bayesian method
M., & Basu, D. K. A genetic algorithm based region for constructing Bayesian belief networks from
sampling for selection of local features in databases. In Proceedings of the Seventh
handwritten digit recognition application. Applied conference on Uncertainty in Artificial Intelligence
Soft Computing, 12(5), 1592-1606, 2012. (pp. 86-94). Morgan Kaufmann Publishers Inc.
5. Plamondon, R., & Srihari, S. N. Online and off-line 18. Salzberg, S. L. C4. 5: Programs for machine
handwriting recognition: a comprehensive survey. learning by j. ross quinlan. morgan kaufmann
IEEE Transactions on Pattern Analysis and Machine publishers, inc., 1993. Machine Learning, 16(3),
Intelligence, 22(1), 63-84. 235-240.
6. AlKhateeb, J. H., Pauplin, O., Ren, J., & Jiang, J.. 19. John, G. H., & Langley, P. Estimating continuous
Performance of hidden Markov model and dynamic distributions in Bayesian classifiers. In Proceedings
Bayesian network classifiers on handwritten Arabic of the Eleventh conference on Uncertainty in artificial
word recognition. knowledge-based systems, 24(5), intelligence (pp. 338-345). Morgan Kaufmann
680-688, 2011. Publishers Inc.
7. Tokas, R., & Bhadu, A. A comparative analysis of 20. Nguyen, H. A., & Choi, D. Application of data mining
feature extraction techniques for handwritten to network intrusion detection: classifier selection
character recognition. International Journal of model. In Challenges for Next Generation Network
© 2018
1 Global Journals
Handwritten Digit Recognition using Machine Learning Algorithms

Operations and Service Management (pp. 399-408). using convex hull based feature set. arXiv preprint
Springer Berlin Heidelberg, 2008. arXiv:1410.0478.
21. Bin Othman, M. F., & Yau, T. M. S. Comparison of 36. Liu, C. L., Yin, F., Wang, D. H., & Wang, Q. F.
different classification techniques using WEKA for (2013). Online and offline handwritten Chinese
breast cancer. In 3rd Kuala Lumpur International character recognition: benchmarking on new
Conference on Biomedical Engineering 2006 (pp. databases. Pattern Recognition, 46(1), 155-162.
520-523). Springer Berlin Heidelberg.
22. Bouckaert, R. R. Properties of Bayesian belief
network learning algorithms. In Proceedings of the
Tenth international conference on Uncertainty in
artificial intelligence (pp. 102-109). Morgan
Kaufmann Publishers Inc.

Year 2018
23. Buntine, W. Theory refinement on Bayesian
networks. In Proceedings of the Seventh conference
on Uncertainty in Artificial Intelligence(pp. 52-60).
Morgan Kaufmann Publishers Inc. 23
24. Random trees, Online: http://docs.opencv.org/

Global Journal of Computer Science and Technology ( D ) Volume XVIII Issue I Version I
modules/ml/doc/random_trees.html, Accessed,
August 2015.
25. Trier, Ø. D., Jain, A. K., & Taxt, T. Feature extraction
methods for character recognition-a survey. Pattern
recognition, 29(4), 641-662.
26. Koerich, A. L., Sabourin, R., & Suen, C. Y. Large
vocabulary off-line handwriting recognition: A
survey. Pattern Analysis & Applications, 6(2), 97-121.
27. Rahman, A. F. R., Rahman, R., & Fairhurst, M. C.
Recognition of handwritten Bengali characters: a
novel multistage approach. Pattern Recognition,
35(5), 997-1006.
28. Chandrasekaran, R., Chandrasekaran, M., &
Siromoney, G. Computer recognition of Tamil,
Malayalam and Devanagari characters. Journal of
the Institution of Electronics and Telecommunication
Engineers, 30(6), 150-154.
29. Seewald, A. K. Digits-a dataset for handwritten digit
recognition.Austrian Research Institut for Artificial
Intelligence Technical Report, Vienna (Austria).
30. Weka Software Documentation, Online: http://www.
cs.waikato.ac.nz/ml/weka/,accessed, August 2015.
31. Weka (Machine Learning)Online: https://en.
wikipedia.org/wiki/Weka_(machine_learning),
accessed, August 2015.
32. Le, Q. V. (2013, May). Building high-level features
using large scale unsupervised learning. In 2013
IEEE international conference on acoustics, speech
and signal processing (pp. 8595-8598). IEEE.
33. Ciregan, D., Meier, U., & Schmidhuber, J. (2012,
June). Multi-column deep neural networks for image
classification. IEEE Conference on Computer Vision
and Pattern Recognition (CVPR), (pp. 3642-3649).
IEEE.
34. Schmidhuber, J. (2015). Deep learning in neural
networks: An overview. Neural Networks, 61, 85-117.
Elsevier.
35. Das, N., Pramanik, S., Basu, S., Saha, P. K., Sarkar,
R., Kundu, M., & Nasipuri, M. (2014). Recognition of
handwritten Bangla basic characters and digits
© 2018 Global Journals

View publication stats

Vous aimerez peut-être aussi